A: we take account security very seriously, and we offer a number of ways to help players keep their account secure, including the battle.net.
答:我们非常重视安全问题,我们将提供了一些方法让玩家确保自己的账户安全。
Through micro-shield APP, you can view the exception log in, set up landing protected, change passwords, view account security level, ready to lock the account.
通过微盾APP,你可以查看异常登录,设置登陆保护地,修改密码,查看帐号安全等级,随时锁定帐号。
Some transactional kiosks, especially ATMs, need to take into account security issues: If their location seems insecure, users will avoid them or use them at their own risk.
有些交易型信息亭,尤其是自动取款机,还要考虑安全因素。如果它们所处的位置不太安全,使用者可能根本就不会使用或者使用时可能会有危险。
While this topic isn't directly related to security hardening, it is a common problem that we see creep into system designs that don't take into account security early enough.
虽然此主题与安全性加强并不直接相关,但却是一个出现在系统设计中且并没有尽早加以考虑的常见问题。
This approach also allows for a transparent addition to the security policy, as account lockouts and password change processes will remain unaffected.
这种方法还允许透明添加到安全策略中,因为帐户锁定和密码更改过程将不受影响。
Your customer’s payments are sent directly to your commerical bank account using the latest security technology.
客户的付款可以使用最新的安全技术直接发送到你的商业银行账户。
Wipe the drive clean : Don't leave personal and financial data, including credit card, bank account, and social security numbers, on your hard drive.
清空你的驱动 :不要在硬盘上留下任何个人资料和财政资料,包括信用卡,银行帐号和社会安全号码。
When the stock price daemon publishes the change, using a system account, each listener will be notified, but in the listener's security context (Figure 4).
当股票价格守护程序发布更改时,将通过系统帐户通知每个侦听器,但仅在侦听器的安全上下文中进行通知(图4)。
Here are some examples: Social security Numbers, driver's license Numbers or identification card Numbers, account Numbers, credit or debit card Numbers, etc.
下面是一些例子:社会安全号码,驾照号或身份证号,账户号,信用卡或者借记卡号,等等。
We include them in the architecture because we want to provide the complete picture; a full treatment of it security must account for a cloud service's non-cloud-specific components.
我们之所以把它们包括在架构之中,是因为我们希望提供一个全景——要完整描述IT安全性就必须也照顾到云服务的非特定于云计算的组成部分。
Another advantage of Treasury Direct is that you can access your account on the Web to check account balances or reinvest a security when it matures.
“国库券直达”的另一个优势就是你可以通过网络进入你的账户并查看账户余额,或者在一项投资到期时进行再投资。
Administration: servers, and in particular software, requires continuous upkeep such as installation of security patches, upgrade of the OS and middleware, user account management and so on.
管理:服务器和某些软件需要连续维护,比如安装安全补丁、升级操作系统和中间件、用户账号管理等等。
This is significant because when the setmqaut command is executed, the profile created contains the Security ID (SID) rather than the string version of the account name.
这一点非常重要,因为在执行setmqaut命令时,所创建的配置文件将包含SecurityID (SID),而不是字符串版本的帐户名。
While Windows 7 still focuses on security, user Account Control (UAC) is far less in your face and more user-configurable than in Vista.
Windows7在注重安全性的同时,用户账户控制(uac)将更少地弹出,并且比Vista更容易由用户自定义。
Project administrators can modify project security and user account information in these ways for all users
用这些方法,项目管理人员可以为所有用户管理项目的安全性和用户帐户信息
Linux and UNIX environments enforce strong security at the user level; the files and processes associated with one user account are not directly accessible by other users.
Linux和UNIX环境在用户级上强制实施高安全策略,与一个用户帐户关联的文件和进程不能被其他用户直接访问。
Securitygroups.php - Lists all security groups defined for your account.
php—列示为您的帐户定义的所有安全组。
This tutorial does not purport to be an example of security in user authentication; instead, it will demonstrate the usage of XForms in the well-known algorithm for logging in and account creation.
这篇教程的主旨并不是示范用户身份验证的安全性。取而代之,本文将演示如何在众所周知的登录和创建帐户的算法中使用Xforms。
For security reasons, we recommend that you do not use the instance owner account for the fenced user account.
由于安全的原因,我们建议不要使用实例所有者帐户作为fenced用户帐户。
This object needs to get hold of the individual account objects, plus there's also security rules and auditing requirements. A common implementation could look something like this.
要实现这个目标,需要获得个人账户的对象,再加上安全规则及审计方面的要求。
You can also set up local account to Kerberos V5 account mappings, which is necessary to inform the operating system how to authorize a specific security principal.
还可以为KerberosV 5帐户映射建立本地帐户,这对告知操作系统如何对特定的安全主体进行授权非常必要。
A Windows service can be run in the security context of a local user account, a domain user account, or the LocalSystem account.
Windows服务可以在本地用户帐户、域用户帐户或LocalSystem帐户的安全上下文中运行。
In terms of security, delegates can only view your inbox and respond to messages on your behalf; they can't access gChat, change your password, or fiddle with other account settings.
考虑到安全因素,邮件代理只允许你查看收件箱和以你自己的账户回复邮件,而不允许访问到gChat服务,修改用户密码或者修改账户的其他设置。
The AMI instance comes with a default user account, virtuser, which is used to enable WebSphere Application Server global security and to access the administrative console.
AMI实例自带一个默认用户帐户virtuser,用于支持WebSphereApplicationServer全局安全性,以及访问管理控制台。
The user account attributes, such as system defaults or user specific, can be found in the file: /etc/security/user.
在 /etc/security/user文件中可以找到用户账户属性,比如系统默认的或用户特有的属性。
First, it extracts the system defaults, then lists each account contained in /etc/security/user that has attributes which overrides the system defaults.
首先,它提取系统默认设置,然后列出 /etc/security/user 中包含的具有非系统默认属性设置的每个账户。
With that said, OAuth can be implemented in a very secure manner and the specification includes a good amount of security considerations to take into account when working with sensitive resources.
也就是说,OAuth可以以非常安全的方式实现,并且在处理敏感资源时,规范本身提供了很多安全方面的考虑。
Improved Internet security features, including the ability to prevent access to Internet password fields in the Domino Directory and Internet account lockout due to password entry failure.
增强了Internet安全特性,包括阻止访问DominoDirectory中的Internet密码字段以及当密码输入错误时停用Internet帐户。
Twitter claims to have fixed the problem, and they have suspended the account Slater created to demonstrate the exploit. However, their fix hasn't completely closed the security hole.
Twitter官方宣称已经补上了这个漏洞,并且已经关闭了斯雷特为了展示而创建的账户,但是他们并没有完全关闭这个漏洞。
But if you're working in a high security environment you need to take into account all of the possibilities discussed in this article.
但是,如果您工作在一个对安全性要求很高的环境中,那么您需要考虑本文所讨论的各种可能性。
应用推荐